Note:
This project will be discontinued after December 13, 2021. [more]
2018-02-12
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
Products | Exiv2 |
Type | Out-of-bounds Read (CWE-125) |
First patch | - None (likely due to unavailable code) |
Links |
• https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md
• https://bugzilla.redhat.com/show_bug.cgi?id=1524107 • https://security.gentoo.org/glsa/201811-14 • https://github.com/Exiv2/exiv2/issues/263 • https://access.redhat.com/errata/RHSA-2019:2101 |